Search Results - (( developing sharing prevention algorithm ) OR ( java binary classification algorithm ))
Search alternatives:
- binary classification »
- prevention algorithm »
- developing sharing »
- sharing prevention »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…Therefore, fair sharing with collision avoidance have to be ensured when MAC protocols are designed. …”
Get full text
Get full text
Thesis -
3
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. …”
Get full text
Get full text
Article -
4
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
Get full text
Get full text
Get full text
Thesis -
5
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
6
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
7
-
8
A conceptual anonymity model to ensure privacy for sensitive network data
Published 2021“…This process of data production and sharing appears to be on the rise. The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
